Implementing Juniper Networks Secure Analytics (IJSA) – Outline

Detailed Course Outline

Day 1

1: COURSE INTRODUCTION

2: Product Overview

  • Overview of the JSA Series Device
  • Hardware
  • Collection
  • Operational Flow

3: Initial Configuration

  • A New Installation
  • Administration Console
  • Platform Configuration
  • Deployment Editor
  • LAB 1: Initial Configuration

4: Architecture

  • Processing Log Activity
  • Processing Network Activity
  • JSA Deployment Options

5: Log Activity

  • Log Activity Overview
  • Configuring Log Activity
  • LAB 2: Log Activity

Day 2

6: Network Activity

  • Network Activity Overview
  • Configuring Network Activity
  • LAB 3: Network Activity

7: Assets and Vulnerability Assessment

  • Asset Interface
  • Vulnerability Assessment
  • Vulnerability Scanners
  • LAB 4: Assets and Vulnerability Assessment

8: Rules

  • Rules
  • Configure Rules and Building Blocks
  • LAB 5: Rules

9: Offense Manager

  • Offense Manager
  • Offense Manager Configuration
  • Offense Investigation
  • LAB 6: Configure the Offense Manager

Day 3

10: JSA Reporting

  • Reporting Functionality
  • Reporting Interface
  • LAB 7: Reporting

11: Basic Tuning and Troubleshooting

  • Basic Tuning
  • Troubleshooting

12: Configuring Junos Devices for Use with JSA

  • Collecting Junos Events
  • Collecting Junos Flows
  • LAB 8: Configuring Junos Devices for JSA

Appendix A: High Availability

  • High Availability
  • Configuring High Availability